Please turn on your JavaScript for this page to function normally.
cube
Identity-in-depth and the evolution of defense

We’ve seen it over and over again: the parade of companies and government agencies announcing the impact of their latest breach. These players have something in common that …

speed
Intrusion detection is speeding up: Is it enough to tackle global cyber threats?

As criminals continue to develop new methods to break or sidestep cyber defences, in many cases the focus is shifting towards the ability to detect and respond to an incident …

diver
Shark or not? 3 real-life security scenarios and how to tell which will really bite

We’ve just wrapped one of my favorite weeks of television, Shark Week. Viewers were treated to show after show of sharks stalking and attacking helpless victims. In most …

user
Most damaging threat vector for companies? Malicious insiders

According to a new SANS survey, 40 percent of respondents rated malicious insiders (insiders who intentionally do harm) as the most damaging threat vector their companies …

measure
Most companies fail to measure cybersecurity effectiveness

Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than …

hand
UK govt urges teenagers to apply for cyber security training programme

UK teenagers are being encouraged to register in a cyber security training programme rolled out to help the nation address the risk of a future skills shortage. The Department …

architecture
The future of AppSec: Stop fighting the last war

It’s a cornerstone of military doctrine: when you focus too much on the last battle you faced, you miss signs of the new battleground taking shape. The principle holds as true …

people
Addressing the deficit in cyber security workforce and national policy

Whether they like it or not, in this day and age nearly all organizations have to think about their cybersecurity posture and find a way to minimize cybersecurity risk. But …

signature
Is cyber insurance worth the paper it’s written on?

Weighing up whether you think insurance is worth it, in any situation, depends to some extent on personal experience. You can see the value of protection far more clearly if …

firefighters
Companies unprepared to measure incident response

Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …

earth
Destruction of Service attacks could shut down organizations for good

The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of …

User
Every organization is only one click away from a potential compromise

Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for …

Don't miss

Cybersecurity news